Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Cyber Attacks
  • Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 1, 2022
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 1, 2022

4 years ago Andrew Swoboda
Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 1, 2022

All of us at Tripwire’s Vulnerability Exposure and Research Team (VERT) are constantly looking out for interesting stories and developments in the infosec world. Here’s what cybersecurity news stood out to us during the week of August 1st, 2022. I’ve also included some comments on these stories.

Windows 11 Smart App Control blocks files used to push malware

Smart App Control, a Windows 11 security feature that blocks threats at the process level, now blocks several file types that threat actors use to infect targets with malware in phishing attacks, reports Bleeping Computer.  This came on the heels of Microsoft again starting to block macros in Office files downloaded from the web, which forced hackers to resort to different file types when launching an attack.

ANDREW SWOBODA | Senior Security Researcher at Tripwire

Smart App Control for Windows 11 has been updated to block several file types. It has been updated to block iso and lnk file types that have been downloaded from the internet. Smart App Control will alert users when applications have been blocked. Smart App Control blocks the the following: .img, .vhd, .vhdx, .appref-ms, .bat, .cmd, .chm, .cpl, .js, .jse, .msc, .msp, .reg, .vbe, .vbs, and .wsf.


High-Severity Bug in Kaspersky VPN Client Opens Door to PC Takeover

A high-severity local privilege-escalation (LPE) vulnerability in Kaspersky’s VPN Secure Connection for Microsoft Windows has been discovered, which would allow an attacker to gain administrative privileges and take full control over a victim’s computer, notes Dark Reading.

Andrew Swoboda | Senior Security Researcher at Tripwire

Kaspersky’s VPN Secure Connect for Microsoft Windows is subject to a local privilege escalation. This vulnerability could allow an attacker to take full control over a victim’s system. The vendor has released version 21.7.7.393 to resolve this vulnerability.


Critical RCE vulnerability impacts 29 models of DrayTek routers

Researchers at Trellix have discovered a critical unauthenticated remote code execution (RCE) vulnerability impacting 29 models of the DrayTek Vigor series of business routers, Bleeping Computer announces. The vulnerability is tracked as CVE-2022-32548 and carries a maximum CVSS v3 severity score of 10.0, categorizing it as critical.

Andrew Swoboda | Senior Security Researcher at Tripwire

DrayTek Vigor is subject to an unauthenticated remote code execution vulnerability. This vulnerability appears to be viable via local and wan connections. Attackers could potentially take complete control of vulnerable devices. The vendor has released patches to resolve this issue.


Zimbra Credential Theft Vulnerability Exploited in Attacks

The US Cybersecurity and Infrastructure Security Agency (CISA) informed organizations on Thursday that a recently patched vulnerability affecting the Zimbra enterprise email solution has been exploited in attacks, notes Security Week.

Andrew Swoboda | Senior Security Researcher at Tripwire

Zimbra is vulnerable to a cleartext credential theft. An attacker could exploit this vulnerability to obtain access to a victim’s email account. This would allow an attacker to potentially gain access to sensitive information. This vulnerability was fixed in 8.8.15 patch level 31.1 and 9.0.0 patch level 24.1.


Keep in Touch with Tripwire VERT

Want more insights from Tripwire VERT before our next cybersecurity news roundup comes out? Subscribe to our newsletter here.

Previous VERT Cybersecurity News Roundups

  • July 25, 2022
  • June 20, 2022
  • June 6, 2022
  • May 30, 2022
  • May 16, 2022
  • May 2, 2022
  • April 25, 2022
  • April 18, 2022
  • April 11, 2022

The post ” Extra, Extra, VERT Reads All About It: Cybersecurity News for the Week of August 1, 2022″ appeared first on TripWire

Source:TripWire – Andrew Swoboda

Tags: Bug, Compliance, Critical Severity, Exploit, High Severity, Microsoft, Phishing, TripWire, Vulnerability

Continue Reading

Previous Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
Next Researchers Uncover Classiscam Scam-as-a-Service Operations in Singapore

More Stories

  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager

2 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware

Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages

2 days ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

3 days ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Critical Langflow Flaw CVE-2026-33017 Triggers Attacks within 20 Hours of Disclosure

3 days ago [email protected] (The Hacker News)

Recent Posts

  • FBI Warns Russian Hackers Target Signal, WhatsApp in Mass Phishing Attacks
  • Oracle Patches Critical CVE-2026-21992 Enabling Unauthenticated RCE in Identity Manager
  • CISA Flags Apple, Craft CMS, Laravel Bugs in KEV, Orders Patching by April 3, 2026
  • Trivy Supply Chain Attack Triggers Self-Spreading CanisterWorm Across 47 npm Packages
  • Trivy Security Scanner GitHub Actions Breached, 75 Tags Hijacked to Steal CI/CD Secrets

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT